Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43379
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2026 | 14:21
Updated At-11 May, 2026 | 22:23
Rejected At-
▼CVE Numbering Authority (CNA)
ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close()

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close() opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is being accessed after rcu_read_unlock() has been called. This creates a race condition where the memory could be freed by a concurrent writer between the unlock and the subsequent pointer dereferences (opinfo->is_lease, etc.), leading to a use-after-free.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/oplock.c
Default Status
unaffected
Versions
Affected
  • From 27b40b7bfcd121fe13a150ffe11957630cf49246 before bf4d66d72e4a9e268c1012c331ce9eaedb5e2086 (git)
  • From 5fb282ba4fef8985a5acf2b32681f2ec07732561 before 960699317d39f46611f4ebeb69edc567c1f4e6b6 (git)
  • From 5fb282ba4fef8985a5acf2b32681f2ec07732561 before dbbd328cf58261ca239756fe1c0d10c9518d3399 (git)
  • From 5fb282ba4fef8985a5acf2b32681f2ec07732561 before b3568347c51c46e2cabc356bc34676df98296619 (git)
  • From 5fb282ba4fef8985a5acf2b32681f2ec07732561 before eac3361e3d5dd8067b3258c69615888eb45e9f25 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/oplock.c
Default Status
affected
Versions
Affected
  • 6.9
Unaffected
  • From 0 before 6.9 (semver)
  • From 6.6.130 through 6.6.* (semver)
  • From 6.12.78 through 6.12.* (semver)
  • From 6.18.19 through 6.18.* (semver)
  • From 6.19.9 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/bf4d66d72e4a9e268c1012c331ce9eaedb5e2086
N/A
https://git.kernel.org/stable/c/960699317d39f46611f4ebeb69edc567c1f4e6b6
N/A
https://git.kernel.org/stable/c/dbbd328cf58261ca239756fe1c0d10c9518d3399
N/A
https://git.kernel.org/stable/c/b3568347c51c46e2cabc356bc34676df98296619
N/A
https://git.kernel.org/stable/c/eac3361e3d5dd8067b3258c69615888eb45e9f25
N/A
Hyperlink: https://git.kernel.org/stable/c/bf4d66d72e4a9e268c1012c331ce9eaedb5e2086
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/960699317d39f46611f4ebeb69edc567c1f4e6b6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dbbd328cf58261ca239756fe1c0d10c9518d3399
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b3568347c51c46e2cabc356bc34676df98296619
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/eac3361e3d5dd8067b3258c69615888eb45e9f25
Resource: N/A
Details not found